ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During a code review you discover that a RESTful service writes every inbound HTTP request, including user passwords and session cookies, to an application log whenever an error is thrown. To meet secure logging confidentiality requirements without sacrificing forensic usefulness, which change should you implement first?

  • Encrypt the existing log files at rest with AES-256 and keep current verbose logging in place.

  • Add a preprocessing step that redacts or masks sensitive fields (e.g., passwords, tokens) before records are written to the log.

  • Reduce the log retention period to twenty-four hours to limit how long sensitive data remains stored.

  • Forward all logs, unchanged, to a hardened remote syslog server over TLS for centralized storage.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot